Fixed some run-on sentences & minor improvements

Minor fixes in grammar, added sudo to some commands for users who may not find it immediately evident they need to use it.
This commit is contained in:
Marta Marczykowska-Górecka 2017-11-18 23:52:54 +01:00 committed by GitHub
parent 27ae3da116
commit d40b0d0333
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -24,10 +24,10 @@ Using and Managing USB Devices
Creating and Using a USB qube Creating and Using a USB qube
----------------------------- -----------------------------
**Warning:** This has the potential to prevent you from connecting a keyboard to Qubes via USB. There are problems with doing this with a encrypted install (LUKS). If you find yourself in this situation, see this [issue][2270-comm23]. **Warning:** This has the potential to prevent you from connecting a keyboard to Qubes via USB. There are problems with doing this in an encrypted install (LUKS). If you find yourself in this situation, see this [issue][2270-comm23].
The connection of an untrusted USB device to dom0 is a security risk since dom0, Connecting an untrusted USB device to dom0 is a security risk since dom0,
like almost every OS, reads partition tables automatically and since the whole like almost every OS, reads partition tables automatically. The whole
USB stack is put to work to parse the data presented by the USB device in order USB stack is put to work to parse the data presented by the USB device in order
to determine if it is a USB mass storage device, to read its configuration, etc. to determine if it is a USB mass storage device, to read its configuration, etc.
This happens even if the drive is then assigned and mounted in another qube. This happens even if the drive is then assigned and mounted in another qube.
@ -46,18 +46,18 @@ steps as root in dom0:
1. Enable `sys-usb`: 1. Enable `sys-usb`:
qubesctl top.enable qvm.sys-usb sudo qubesctl top.enable qvm.sys-usb
2. Apply the configuration: 2. Apply the configuration:
qubesctl state.highstate sudo qubesctl state.highstate
Alternatively, you can create a USB qube manually as follows: Alternatively, you can create a USB qube manually as follows:
1. Read the [Assigning Devices] page to learn how to list and identify your 1. Read the [Assigning Devices] page to learn how to list and identify your
USB controllers. Carefully check whether you have a USB controller that USB controllers. Carefully check whether you have a USB controller that
would be appropriate to assign to a USB qube. Note that it should be free would be appropriate to assign to a USB qube. Note that it should be have no
of input devices, programmable devices, and any other devices that must be input devices, programmable devices, and any other devices that must be
directly available to dom0. If you find a free controller, note its name directly available to dom0. If you find a free controller, note its name
and proceed to step 2. and proceed to step 2.
2. Create a new qube. Give it an appropriate name and color label 2. Create a new qube. Give it an appropriate name and color label